Trust Lockdown™

Only Runs Trusted Apps, Nothing Else!

You begin with our standard Trust-Listsfor commonly used applications.Then you identify what else you want to allow,and add these Apps to your Trust-List.

We validate all executables and scripts at the kernel layer by comparing them to your Trusted Apps.Only Trusted Apps are Run. Everything else is blocked.Regardless of whether it was a phishing email, a malicious ad, website or USB drive, untrusted Apps never run.

Our Patented Handprint Identification technology stops hackers from passing off a malicious App or Script as a Trusted App.Our Handprint is more secure than a single hash and prevents the SHAttered Attack that fools application whitelisting.You can also add Code-Signing Certificate based validation to allow your Trusted Apps to update automatically.

To setup a pilot trial, contact us today.

Latest Posts

To reliably block malware executables, scripts, and libraries, including Ransomware, you must add some form of Application Execution Control to your toolbox. One of my colleagues recently used one of the best analogies I’ve heard when he said “Not using ‘application execution control’ as a means of securing your computers is like driving on bald[…]

Thus far in our series we have reviewed a sophisticated ransomware utilizing stealth and lateral movement techniques, an infamous case of wiperware masquerading as ransomware spread by hacked nation-state tools and an ever-changing swiss army knife which exists as a tool run by one criminal organization offering services to many. Today, in 2019, the[…]

No, not that guy! *Scranos*. Scranos, the data-stealing malware which, according to ZDnet in an article dated June 13, 2019 claims, “…has returned with new attacks and nasty upgraded features”. It’s not quite as scary as a being capable of erasing half the population of earth, but you would not know that when reading[…]

Recently, shouts rang loud from technical publications and news agencies far and wide: Quick! Patch everything! Share the news! Microsoft thinks the possibility of another WannaCry is real. Pundits opine the threat must be horrendous if Microsoft is releasing a patch for an operating system for which they dropped support over 5 years ago. I[…]

Scary new attacks spike! Be afraid! Buy stuff! It’s complicated, hire expensive help! Well, it is scary if you have poor posture. Complex, expensive software is necessary without a proper stance. Need proof? Of course, that’s why you are here, right? Let’s take a look at the big, bad boogyman we’re now told to fear…[…]

Can we talk about posture for a moment? I’m talking about cybersecurity posture. My bet is most people reading this are in a “default-allow” posture on their local PC at home and at work. What do I mean? Your computer’s CPU allows everything to execute. Unless the thing executing has been previously seen doing bad things,[…]

The concept of Prevention before Detection is very easy to understand in most industries, except cybersecurity. Breach after breach in today’s news give us plenty of examples of cybersecurity professionals depending too much on Detection, and not enough on Prevention. But is that what you the business owner or consumer expect? I’m sure there are a[…]

Three high profile ransomware attacks in only 2 months is certainly making news across the globe. And it’s clear from all the headlines there are plenty of easy targets whose IT Management are stuck in the ransomware cycle – Watch, Wince, Repeat. Silly, because these ransomware attacks are/were preventable from the start. In May, a[…]

Greg Masters, Managing Editor of SC Media does a great job painting a clear picture of cybersecurity this year from the statistics recently published in ISACA’s “State of Cyber Security Study 2017”. It is clearly a“Perfect storm: Not only is the volume and complexity of cyberattacks increasing, but there’s also a lack of resources necessary to[…]

Rob Clyde, Executive Chair of the Board of Directors at White Cloud Security, shares his perspective in Steve Lasky’s article WannaCry Ransomware Worm Attacks the World. A Security Executives article through SecurityInfoWatch.com. “Ransomware attacks are not new. In fact, ISACA has been sounding the alarm on the increasing spate of ransomware for a while now.[…]